Kernel Security Checker is a useful tool to locate attackers residing within a system by employing a direct analysis of the kernel through /dev/kmem and bypassing the hiding techniques of the intruder (kernel static recompilation or use of LKMs). It can find the modified syscalls from userspace, detect the promiscuous interfaces, and find the modifications applied to a protocol.
The goal of Escape-K is to provide an all-in-one platform for IT service management. This means that using a single application (the Escape-K client console), users are able to manage any sized computer organization, from workstation and printers to servers, databases, or network devices. Escape-K follows the main guidelines recommended by ITIL. Therefore, the core of the application is the composed of the CMDB. Depending of the chosen perspective, Escape-K users can deal with incidents and problem resolution as well as server or database administration.
Pantheios is a C/C++ logging API library. It offers an optimal combination of complete type-safety, very high efficiency, genericity, and extensibility. It is simple to use and extend, highly portable (platform and compiler independent), and it upholds the C tradition of only paying for what you use. Pantheios supports logging of message statements of arbitrary complexity, consisting of heterogenous types. Pantheios supports filtering of log messages based on severity level.
Nagstamon is a Nagios status monitor with a UI that resides in the systray or as a floating statusbar on your desktop. It informs you in realtime about the status of your Nagios, Icinga, Opsview, Ninja, Check_MK/Multisite, Centreon, or Thruk-monitored network. It alerts you with sound and visual notification. Failed hosts and services are easy to connect with by SSH, RDP, and VNC. Custom actions can be run on certain events. It works best with GNOME, but also with KDE, Mac OS X, and Windows.
check_logfiles is a plugin for Nagios which checks logfiles for defined patterns. It is capable of detecting logfile rotation. If you tell it how the rotated archives look, it will also examine these files. Unlike check_logfiles, traditional logfile plugins were not aware of the gap which could occur, so under some circumstances they ignored what had happened between their checks. A configuration file is used to specify where to search, what to search, and what to do if a matching line is found.